We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects

Published on July 2012 by R. Anitha, S. Ravimaran, P. Valarmathi
Advanced Computing and Communication Technologies for HPC Applications
Foundation of Computer Science USA
ACCTHPCA - Number 1
July 2012
Authors: R. Anitha, S. Ravimaran, P. Valarmathi
b884a2e8-b363-403f-8fde-ef717c66b5ec

R. Anitha, S. Ravimaran, P. Valarmathi . Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects. Advanced Computing and Communication Technologies for HPC Applications. ACCTHPCA, 1 (July 2012), 21-25.

@article{
author = { R. Anitha, S. Ravimaran, P. Valarmathi },
title = { Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects },
journal = { Advanced Computing and Communication Technologies for HPC Applications },
issue_date = { July 2012 },
volume = { ACCTHPCA },
number = { 1 },
month = { July },
year = { 2012 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /specialissues/accthpca/number1/7551-1005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Advanced Computing and Communication Technologies for HPC Applications
%A R. Anitha
%A S. Ravimaran
%A P. Valarmathi
%T Security Model that prevents Data Leakage in Distributed Mobile Systems using Surrogate Objects
%J Advanced Computing and Communication Technologies for HPC Applications
%@ 0975-8887
%V ACCTHPCA
%N 1
%P 21-25
%D 2012
%I International Journal of Computer Applications
Abstract

Devices such as smart phones are considered to be the most common communication devices in current scenario. Recently, mobile phones are not only used for voice and message communication but also, sending and receiving important data such as social security numbers, bank account details and passwords, so it is important to provide proper security to the data's in the distributed mobile environment. Although there is lots of security mechanisms have been proposed already, a lot more needs to be done. We have proposed a new security model that prevents data leakage among object based transaction execution in distributed mobile environment. The model first secures the data on the object by authenticating the user and then secures the data during transaction execution and reconciliation. The proposed mechanism is efficient in securing the data's because communication has been reduced by making the object to act on behalf of the server. It also ensures confidentiality of transaction by creating an encrypted tunnel between the objects and database server. The entire process is simulated and results shows that our model is more secured and provide less communication overhead than the existing models in the distributed mobile environment.

References
  1. Constantinos F. Grecas, Sotirios I. Maniatis and Iakovos S. Venieris, "Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration", Mobile Networks and Applications, Volume 8, 2003.
  2. Uwe G. Wilhelm,"Increasing Privacy in Mobile Communication Systems using Cryptographically Protected Objects", Verläßliche IT-Systeme, 1997.
  3. DeviceForge "An IntroductioSurrogate Object Model: A New Paradigm for Distributed Mobile Systemsn to Elliptical Curve Cryptography", July 20,2004.
  4. X. Ding, D Mazzochi, and G Tsudiatures", ACM Transactions on Internet Technology (TOIT), 2007.
  5. Fangguo Zhang, Yi Mu, and Willy Susilo, "Reducing Security Overhead for Mobk, "Equipping Smart Devices with Public Key Signile Networks," The proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA'05), Vol. 1, 2005.
  6. Jagdish Bhatta and Lok Prakash Pandey "Performance Evaluation of RSA Variants and Elliptic Curve Cryptography on Handheld Devices" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 11, November 2011.
  7. M. A. Maluk Mohamed, D. Janakiram and Mohit Chakraborty "Surrogate Object Model: A New Paradigm for Distributed Mobile Systems"
  8. N. T. Trask and M. V. Meyerstein, "Smart Cards in Electronic Commerce", A SpringerLink journal on BT Technology, Vol. 17, No. 3, 2004, pp. 57-66.
  9. N T Trask and S A Jaweed, "Adapting Public Key Infrastructures to the Mobile Environment", A SpringerLink journal on BT Technology, Vol. 19, No. 3, 2004, pp. 76-80.
  10. E Mohammed, A E Emarah, and K El-Shennawy, "Elliptic Curve Cryptosystk, "Equipping Smart Devices with Public Key Signems on Smart Cards", Proceedings of IEEE International Carnahan Conference on Security Technology, 2001.
  11. A. S. Wander, N Gura, H Eberle, V Gupta, and S C Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks", Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, 2005.
  12. Millan, W. , Gauravaram, P. , 2004. Improved Attack on the Cellular Authentication and Voice Encryption Algorithm. International Workshop on Cryptographic Algorithms and their Uses. Gold Coast, Australia, July 2004.
  13. Wingert, C. , Naidu, M. , 2002. CDMA 1xRTT Security Overview. Qualcomm Incorporated.
  14. Millan, W. , Gauravaram, P. , 2004. Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm. IEICE Electronics Exprss, Vol. 1, No. 15.
  15. V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila "A Survey of the Elliptic Curve Integrated Encryption Scheme" Journal of computer science and engineering,Vol. 2,issue2,August2010
Index Terms

Computer Science
Information Sciences

Keywords

Security Authentication Surrogate Object Confidentiality.